Playing Attack and Defense with Trusted Storage

Javier Gonzalez, Philippe Bonnet, Luc Bouganim

Research output: Journal Article or Conference Article in JournalConference articleResearchpeer-review


It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service running on a secure device, than to attack the same service running on a general purpose device.
Original languageEnglish
JournalITUs skriftserie
Number of pages8
Publication statusPublished - 2014


  • Trusted Computing
  • Privacy Guarantees
  • Data Management
  • Secure Devices
  • Trusted Execution Environment


Dive into the research topics of 'Playing Attack and Defense with Trusted Storage'. Together they form a unique fingerprint.

Cite this